Primitive Root - Cryptography | Number Theory
Вставка
- Опубліковано 28 вер 2024
- How to find Primitive root of a given number in mod(n)
Using tables of indices to solve congruences.
Lecture 2 - To find primitive root of a number ' n' : • Primitive Root | Lectu...
Lecture - To find number of primitive roots of a prime number 'p' : • To find number of Prim...
===========================
#PrimitiveRoot #NumberTheory
Thanks for watching.
Do like , share and subscribe
--------------------------------------------------------------------
#Cryptography #NetworkSecurity #Ciphers #SymmetricCiphers #Encryption
#Decryption
#ComputerScience #VTU #GATE
#SecretKeyDistribution #PublicKeyCryptography
Extended Euclidean Algorithm for Modular Inverse : • Extended Euclidean Alg...
s DES - Key Generation: • S-DES Encryption || Si...
s DES - Encryption : • S-DES Encryption || Si... Public
Differences between s-DES and DES: • Differences between s-...
Primitive Root : • Primitive Root - Crypt...
Diffie Hellman Key Exchange : • Network Security - Dif...
Euler's Totient Function [Euler's Phi Function] : • Euler's Totient Functi...
Fermat's Theorem - Explanation with example: • Fermat's Theorem - Exp...
Route Cipher: • Route Cipher - Transpo...
Four Square Cipher: • Four Square Cipher - S...
caesar Cipher: • Cryptography - Caesar...
Meet in the middle attack : • Meet in the Middle att...
Blowfish Algorithm : • BLOWFISH ALGORITHM in ...
Elliptic Curve Cryptography - 1 : • Elliptic Curve Cryptog...
Brute Force Attack : • Brute force attack in ...
Avalanche Effect : • Avalanche Effect in Cr...
Double DES and Triple DES : • Double DES and Triple...
Steganography & Cryptography : • Steganography and Cryp...
Block Cipher Modes of Operation : • Block Cipher Modes of ...
Message Authentication using Hash Function: • Message Authentication...
Message Authentication Codes MACs : • Network Security - Mes...
Network Security - Attacks : • Network Security - Att...
Authentication using Message Encryption : • Network Security - Au...
RSA Algorithm : • Network Security - RSA...
Advanced Encryption Standard : • Network Security - AES...
Categories of Cryptographic Systems : • Categories of Cryptogr...
Data Encryption Standard DES : • Data Encryption Standa...
Public Key Cryptosystems : Advantages: • Public Key Cryptosyste...
Public Key Distribution - Part 1 : • Public Key Distributio...
Public Key Distribution - Part 2 : • Public Key Distributio...
Vigenere Cipher: • Vigenere Cipher - Cryp...
Affine Cipher : • Affine Cipher Encrypti...
Chinese Remainder Theorem : • Video
Congruences: • Congruences - Cryptogr...
Transposition Cipher : • Transposition Cipher |...
Euclidean Algorithm for GCD : • Euclidean Algorithm to...
Playfair Cipher : • Cryptography - Playfai...
=====================================================================
To watch lecture videos on Cryptography:
• Cryptography and Netwo...
To watch lecture videos on Digital Electronics:
• Digital Electronics / ...
To watch lecture videos on 12th Maths:
• CBSE - Class 12 - Math...
To watch lecture videos on 10th Maths:
• NCERT - 10th Mathematics
To watch lecture videos on Vedic Maths:
• Vedic Maths
To watch lecture videos on Information Theory/Coding Theory:
• Information Theory and...
To watch lecture videos on Electronics:
• Electronics
To Subscribe:
/ @lecturesbyshreedarsha...
To follow my Facebook page : / lectures-by-shreedarsh...
Follow Naadopaasana channel - Classical Music, Spiritual discourse channel
/ @naadopaasana-musicisd...
Follow my Blog on Hinduism and Spiritual Significance: naadopaasana.c...
---------------------------------------------------------------------------------------
Engineering mathematics, Cryptography, Number Theory, Maths, Maths for Cryptography and network security, Network security,Engineering lectures,
Lectures by Shreedarshan K,symmetric ciphers, Public key cryptosystems,Encryption, Decryption,Public Key Distribution,Public Key Authority,
Public Key Certificate, Fermat's Theorem, Diffie Hellman Key Exchange, Hill Cipher ,VTU solved Examples,RSA,
Ciphers
Symmetric Ciphers
Cryptography
Network Security
Polynomials
Primitive root
DES
Data Encryption Standard
Confusion
Diffusion
Hill Cipher
Playfair Cipher
Caesar Cipher
Hill Cipher
Steganography
Triple DES
Meet in the middle attack
Blowfish Algorithm
Eulers Theorem
Chinese Remainder Theorem
IDEA
GCD
Number Theory
Extended Euclidean Algorithm for Modular Inverse
I have published " Bharatiya Katha Vaibhava Vol 1 and Vol 2" books for children. For details, orders check the telegram link:
t.me/joinchat/bv4e2-mQrCtkZjI9
Thanks sir. In whole You tube, there in no any video about primitive root with this much clear explanation. You saved me. Thanks again.
Thanks ☺️
this made so much more sense than the last video I watched on this, great job and thank you!!
Thank you
That's a great help!!
Thanks.. Please do subscribe and share..
good video
Thank you sir very useful
I am delighted to inform you all that i have authored a book of stories for children titled: " Bharatiya Katha Vaibhava -1".
The book was released for Deepavali.
This book features 25 unique and popular short Stories with beautiful illustrations from our Epics, and from the life of our Saints, Sages, and Rulers...
This is indeed a wonderful gift for children especially to be given as a prize for competitions! You can order in bulk too. Orders are welcome for libraries, schools etc..
Please note that Ebook kindle versions and paperback versions [B&W illustrations] can be bought online..
Find the links..
Zorba Store:- www.zorbabooks.com/store/children/bharatiya-katha-vaibhava-1-stories-for-children/
Amazon (outside India) : www.amazon.com/Bharatiya-Katha-Vaibhava-SHREEDARSHAN-K-ebook/dp/B08N53PM3B/
Amazon Kindle:- www.amazon.in/dp/B08N53PM3B
Note: To buy the full colour version book (paperback with colour illustrations) please contact the author , as they are only being printed at the author's request. The discounted price of the full colour version book is Rs 300/-.
Those who wish to avail of this offer, please contact/message me.(Especially if you want a full colour version book, please inform at the earliest..)
For bulk orders and discounts on B&W version and for colour version books you can contact ...
Email: shreedarshan@gmail.com
/ naadopaasana18@gmail.com
Regards,
Shreedarshan K (Author)
Good job!
tnq....sir
Why we take less than 7 values only?
Since 8 is just 7 + 1, it would give you all the same values as 1 since the seven gets divided out. 9 would be the same as 2, 10 would be the same as 3, and 15 would be the same as 1 again.
Helped with primitive roots. Thanks
Thanks sir
Thanks 😊
you should also explain with a composite number
Thank you soo much sir... keep it up
Thank you for this clear explanation. I really appreciate that you took the time to make this :)
Lots of love from kashmir....
very great job. I thank you so much, man. do not stop keep it up please
Managed to finish my exercise thanks to you, thanks !! awesome technique
Am glad you found it helpful
Thank you Sir
The best 👏🏼
Great explanation, thanks.
Great explanation. Thanks!!!!
Thanks Sir
You're hand writing is lovely and so is your explanation
Thanks
Thanks a lot sir, please make more videos for cyber security
Sure,.. Do share the channel with those interested and subscribe...
Thanks a lot 🙏🙏
My pleasure!
Thanks it helped a lot.
Thanks..Do share and subscribe..
great tutorial!
Thanks...
how can 10 and 5 be co-prime to each other gcd(10,5)=5 not 1
Awesome explanation 👍
Thanks
sir please tell about 31 primitive root
U mean primitive roots of number 31?
Please do share and subscriber the channel.. Regards
Just a few observations:
Given an odd prime number n, then by Fermat's Little Theorem, aⁿ⁻¹ = 1 mod n for any positive integer a. Therefore, the n-1 entry in your table must be 1 regardless of the value for a. Since every integer from 1 to n-1 must be represented for a to be a primitive root, it follows that 1 can't appear in any other column.
Again because every integer from 1 to n-1 must be represented, it follows that the entry with the n-1 value must be at the halfway point, i.e. the (n-1)/2 entry, for a to be a primitive root. We see this in your example: You show 3 and 5 to be the primitive roots of 7, and 6 is the value for n = 3 when a = 3 or 5. As for why this is true, it is because (n-1)² = n² - 2n +1 = 1 mod n. Since 1 must be the n-1 entry, the n-1 value must be the (n-1)/2 entry.
So to find the primitive roots when n is prime, test the values for a from 1 to (n-1)/2 in ascending order. If you get a value that gives 1 mod n, you can stop - a is not a primitive root. If you get a value that gives (n-1) mod n, then a is a primitive root if and only if a = (n-1)/2.